When Active Directory is under threat,
only one team of heroes can save the day

Don’t let your customers make the
headlines for the wrong reasons.

Organisations across the world are changing and evolving at a quickening pace, critical IT systems can be disparate, diverse and expensive to manage. Quest have created simple-to-use, innovative IT management software that saves time and money across physical, virtual and cloud environments.

Quest offers a broad and deep selection of products that target common IT challenges, and more than 100,000 worldwide customers are enjoying the simplicity of working with Quest tools to solve so many IT management challenges.

Foglight

Quickly identify and resolve performance issues across databases and virtual environments with Foglight. It easily integrates with existing tools, so users can monitor and analyse the data from almost any source across their infrastructure and view it through a single interface.

Resources:

Spotlight

Ensure peak performance of SQL Server environments with unmatched monitoring, diagnosis and optimisation around the clock. Spotlight provides access to all the details that a DBA needs to make sure that the SQL Server database is running smoothly.

Resources:

Toad DevOps Toolkit

Database development no longer has to be a bottleneck in the otherwise agile DevOps process of your customers. Quest Toad DevOps Toolkit makes it easy to execute key database development functions within the DevOps workflow, without compromising quality, performance and reliability.

Resources:

Backup & Disaster Recovery Suite

Backup & Disaster Recovery Suite offers full access to three of our most powerful data protection software applications — Rapid Recovery, NetVault Backup, and vRanger — based on your front-end backup size. You’ll never overpay for a one-size-fits-all solution with features you don’t use. Simply purchase the components you need today and add capacity as your business grows.

Resources:

Foglight

Quickly identify and resolve performance issues across databases and virtual environments with Foglight. It easily integrates with existing tools, so users can monitor and analyse the data from almost any source across their infrastructure and view it through a single interface.

NetVault Backup

The NetVault data protection solution simplifies data protection across physical or virtual environments and applications, helping you to easily achieve your backup and recovery SLAs, get faster return on investment and reduce the total cost of ownership for data protection.

Resources:

Rapid Recovery

Rapid Recovery delivers a better way to protect Windows and Linux environments with fast backup and even faster replication and recovery. Working across VMs and physical servers, on-premise or remote, it delivers protection for business-critical applications including Microsoft Exchange, Microsoft SQL Server and Microsoft SharePoint. All capabilities can easily be managed via a single web-based management console.

Resources:

vRanger

vRanger provides backup and recovery capabilities for VMware virtual environments and physical Windows servers. Get fast, affordable and scalable protection that’s easy to use and easy to manage. vRanger supports VMware ESX and ESXi systems and can backup and restore any guest VM supported by VMware. vRanger is available in two editions: vRanger Standard Edition provides simple and fast data protection for small virtual environments and vRanger Pro adds improved scalability and disaster recovery capabilities for any size virtual or physical Windows environment.

Resources:

Endpoint Systems

Simplify management of a wide array of systems and devices

Provisioning, deploying and managing systems do not have to be costly and time-consuming tasks. Endpoint Management solutions from Quest can help you simplify management of a diverse array of endpoint systems and devices, including desktops, laptops, servers, Chromebooks, mobile devices, virtual workspaces and even connected non-computing devices. With these solutions, users can deploy systems, manage software updates, install patches and conduct asset inventory efficiently, so IT staff can refocus on more strategic projects.

Desktop Authority

Desktop Authority centralises control over the desktop, combining into one comprehensive solution the functionality usually achieved with a combination of log on scripting, group policies, user profiles, and a variety of security solutions. By integrating configuration, inventory, reporting, patch management, anti-spyware, device lockdown, power management and remote management into a single solution, administrators can efficiently and effectively manage the desktop environment from one console, lowering the total cost of desktop ownership.

KACE1000 Asset Management Appliance

Streamline IT asset management, secure network-connected devices, and service end-user systems more efficiently. It’s all possible with the industry’s only appliance-based comprehensive endpoint systems management solution built for growing organisations.

Resources:

One Identity

Identity and Access Management for the real world

Eliminate the complexities and time-consuming processes often required to govern identities, manage privileged accounts and control access. These solutions enhance business agility while addressing challenges in cloud, hybrids and on-premises environments.

Active Roles

Simplify the security and protection of Active Directory (AD) to solve security issues and meet compliance requirements with the help of Active Roles. It helps overcome AD’s native limitations, You can enjoy a new level of efficiency with its automated management of users and groups, as well as delegation tasks. You can easily meet your business requirements today, as well as scale to address future needs thanks to Active Roles’ modular architecture.

Resources:

Cloud Access Management

Cloud Access Manager (CAM) is a web-access management solution that offers secure and unified access to all your internal and cloud-based web applications while simultaneously enhancing security and IT efficiency.

Resources:

Enterprise Single Sign-on

Enterprise Single Sign-on enables an organisation to streamline both end-user management and enterprise-wide administration of single sign-on (SSO). It bases application and system user logins on existing Active Directory identities, do there’s no infrastructure for users to manage.

Identity Manager

Take the risk out of enterprise identity and access management. With Identity Manager and its modular and scalability capabilities, users can unify security policies, meet compliance needs and achieve governance while improving business agility – today and long into the future.

Resources:

Password Manager

Password Manager provides a simple, secure, self-service solution that enables end users to reset forgotten passwords and unlock their accounts. Now your organisation can implement stronger password policies while reducing its help desk workload. With Password Manager, you no longer have to sacrifice security to reduce costs.

Resources:

Privileged Password Manager

With Privileged Password Manager, you can automate and control the process of granting access to privileged accounts and passwords. These extremely critical credentials are only granted if established policy is followed and if required approvals are received. Privileged Password Manager tracks all activity and ensures that passwords are changed immediately upon return. Plus, it further elevates security by replacing embedded privileged passwords with programmatic calls.

Resources:

Microsoft Platform Management

Migrate, secure and manage Microsoft infrastructure
It’s time your end users optimised their IT environment and secure their Microsoft infrastructure to prepare for what’s next.
Quest’s MPM solutions help users migrate, manage and secure their data across on-premises, cloud-based and hybrid platforms.

Resources:

GPOADmin

As one of the most robust configuration tools in your Windows infrastructure, Group Policy plays a major role in establishing a secure and compliant networking environment for your users. With Group Policy regulating everything from critical business processes and security settings to individual workstations and printers, managing Group Policy Objects (GPOs) can become time-consuming and expensive.

Award-winning GPOADmin automates critical group policy management tasks to reduce costs and eliminate manual processes. GPOADmin extends the Microsoft Group Policy Management Console so you can quickly and effectively administer GPO changes and verify and compare GPO versions over time to confirm the consistency of different GPO settings.

Resources:

InTrust

InTrust enables you to securely collect, store, search and analyse massive amounts of IT data from numerous data sources, systems and devices in one place. Get real-time insights into user activity for security, compliance and operational visibility. In a single view, you can discover what resources users have access to, how that access was obtained and how it was used.

Resources:

On Demand

Quest On Demand is a simplified SaaS-based cloud backup, recovery and policy management tool that enables users to recover Azure Active Directory (AD) and Office 365 users, attributes, groups and group memberships. It allows users to visualise the difference between backups and their live Azure AD environment as well as enforce Exchange Online policies and configurations.

Active Administrator

Active Administrator, the comprehensive Active Directory solution from ScriptLogic provides administrators the ability to establish, view and enforce delegated security throughout Active Directory management, perform comprehensive Group Policy management including Group Policy reporting and Resultant Set of Policies (RSoP) as well as powerful auditing and reporting of changes within Active Directory.

Active Directory Management involves the delegating, securing, configuring, managing and auditing of changes to Microsoft’s implementation of LDAP directory services for use in Windows environments. The main purpose of Active Directory is to provide central authentication and authorisation services. Active Directory has native tools for basic administration, but, lack enterprise-class management capabilities that give administrators the ability to view, audit and report on the ever-changing state of their Active Directory infrastructure.

Resources:

Change Auditor

Award-winning Change Auditor proactively tracks, audits, reports, and alerts on vital configuration changes in real-time and without the overhead of native auditing. You will instantly know who made what change when, where and why. Plus, get the original and current values for fast troubleshooting. You can then automatically generate intelligent, in-depth forensics for auditors and management and reduce the risks associated with day-to-day modifications.

Defender

Defender was designed to base all administration and identity management on an organisation’s existing investment in Active Directory and eliminates the costs and time involved in setting up and maintaining proprietary databases. In addition, Defender works with any OATH-compliant hardware token enabling organisations to select the most appropriate token for their users.

By leveraging an organisation’s existing investment in Active Directory and supporting multiple token vendors, Defender enables organisations to increase security and achieve and sustain compliance in a cost-effective manner.

Resources:

Security Explorer

Security Explorer simplifies the management of NTFS file and folder security, file shares, services, printer access, registry security and scheduled tasks, ensuring that access to privileged information is restricted on Windows servers and workstations, and playing a key role in standardising security management across the entire Windows network.

Resources:

Unified Communications Command Suite

Connect users with each other and the information they need to succeed — at the office, at home or on the go. Quest Solutions for Microsoft® Unified Communications and Collaboration (UC&C) applications can help you optimise your productivity from end user to data centre.

Resources:

Sigma's dedicated team are here to help you, the reseller, with scoping opportunities, product positioning, quoting and closing deals. Contact us at sales@sigmasd.com alternatively call us on +44 (0)1364 655200.